Object-oriented approach to specify secret sharing protocol in security critical system using formal method

Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secur...

Full description

Saved in:
Bibliographic Details
Main Authors: Yew, Kok Meng, Rahman, Mohammad Zahidur, Lee, Sai Peck
Format: Article
Published: Faculty of Computer Science and Information Technology, University of Malaya 2000
Subjects:
Online Access:http://eprints.um.edu.my/25849/
https://ejournal.um.edu.my/index.php/MJCS/article/view/5823
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.25849
record_format eprints
spelling my.um.eprints.258492021-04-12T01:41:13Z http://eprints.um.edu.my/25849/ Object-oriented approach to specify secret sharing protocol in security critical system using formal method Yew, Kok Meng Rahman, Mohammad Zahidur Lee, Sai Peck QA75 Electronic computers. Computer science Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secured system, like secure secret sharing protocol, there is no other alternative than the formal method. In this paper, we first briefly introduce the secret sharing system and Object-Z formal specification tool. Then we present our design of the secret sharing scheme. In our model, the participating user and the information sharing authority dealer are modeled. To exchange information securely between users and the dealer, private channels are used. Broadcast channel is used for open information exchange. Both types of channels have been modeled. The model is formally specified by introducing the concept of combine object for collecting secret shares and for checking whether they lie in the perfect secret sharing scheme. We finally conclude with our experience. Faculty of Computer Science and Information Technology, University of Malaya 2000 Article PeerReviewed Yew, Kok Meng and Rahman, Mohammad Zahidur and Lee, Sai Peck (2000) Object-oriented approach to specify secret sharing protocol in security critical system using formal method. Malaysian Journal of Computer Science, 13 (1). pp. 76-83. ISSN 0127-9084 https://ejournal.um.edu.my/index.php/MJCS/article/view/5823
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Yew, Kok Meng
Rahman, Mohammad Zahidur
Lee, Sai Peck
Object-oriented approach to specify secret sharing protocol in security critical system using formal method
description Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secured system, like secure secret sharing protocol, there is no other alternative than the formal method. In this paper, we first briefly introduce the secret sharing system and Object-Z formal specification tool. Then we present our design of the secret sharing scheme. In our model, the participating user and the information sharing authority dealer are modeled. To exchange information securely between users and the dealer, private channels are used. Broadcast channel is used for open information exchange. Both types of channels have been modeled. The model is formally specified by introducing the concept of combine object for collecting secret shares and for checking whether they lie in the perfect secret sharing scheme. We finally conclude with our experience.
format Article
author Yew, Kok Meng
Rahman, Mohammad Zahidur
Lee, Sai Peck
author_facet Yew, Kok Meng
Rahman, Mohammad Zahidur
Lee, Sai Peck
author_sort Yew, Kok Meng
title Object-oriented approach to specify secret sharing protocol in security critical system using formal method
title_short Object-oriented approach to specify secret sharing protocol in security critical system using formal method
title_full Object-oriented approach to specify secret sharing protocol in security critical system using formal method
title_fullStr Object-oriented approach to specify secret sharing protocol in security critical system using formal method
title_full_unstemmed Object-oriented approach to specify secret sharing protocol in security critical system using formal method
title_sort object-oriented approach to specify secret sharing protocol in security critical system using formal method
publisher Faculty of Computer Science and Information Technology, University of Malaya
publishDate 2000
url http://eprints.um.edu.my/25849/
https://ejournal.um.edu.my/index.php/MJCS/article/view/5823
_version_ 1696976591388672000
score 13.211869